Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 11:24

General

  • Target

    3d2ce9bbff4412baa9e3361275981a03_JaffaCakes118.exe

  • Size

    9KB

  • MD5

    3d2ce9bbff4412baa9e3361275981a03

  • SHA1

    4abacea76bb53e4de33e6a17988f4625d10660f6

  • SHA256

    7ae00f3bf8e472a13d69ab7009ec1e69804c3c362388ef986e4b683f0f221ebe

  • SHA512

    ac65c4b1f260f6521b8b46bdd81ffa0780a9802f39d647bdf7d15907beb4f3e276d10522478d3d5fc208fdce80a9de0f65e0e3a6d92c4056438eb8aa83041319

  • SSDEEP

    96:nP0c00gzDeSIp5ao5h3nuyYajSSSb8tsklonyUvkmTRVa7gi8VOT:nsckWko5h3nuykb8TWnyUv5T6ZvT

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d2ce9bbff4412baa9e3361275981a03_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3d2ce9bbff4412baa9e3361275981a03_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:2980
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "del "C:\Users\Admin\AppData\Local\Temp\3d2ce9bbff4412baa9e3361275981a03_JaffaCakes118.ex""
        2⤵
          PID:2340
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "del "C:\Users\Admin\AppData\Local\Temp\3d2ce9bbff4412baa9e3361275981a03_JaffaCakes118.ex""
          2⤵
            PID:1928

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2980-0-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB